HACS-workshop / spectre-mitigations
☆15Updated 6 years ago
Related projects: ⓘ
- ☆34Updated 7 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆57Updated 7 years ago
- ☆14Updated this week
- free crypto audit☆31Updated 7 years ago
- Checking that functions are constant time with Valgrind☆173Updated 7 years ago
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago
- Slides and examples to accompany the September 25th invited talk at SAT 2015☆14Updated 8 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago
- SIDH C reference implementation☆13Updated 7 years ago
- ☆17Updated this week
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆27Updated 6 years ago
- Classical simulator for Kuperberg's quantum collimation sieve, generalized to arbitrary finite cyclic groups and focused on CSIDH-512.☆14Updated 5 years ago
- Code to fuzz bignum libraries☆45Updated 5 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 6 years ago
- Public forum for detailed planning of a VLDB-like ongoing submission model for IEEE S&P☆15Updated 7 years ago
- Source code of the Whitebox Contest Submission Server☆35Updated last month
- ☆168Updated 3 years ago
- Using SGX to harden password hashing☆33Updated 8 years ago
- SGX command-line tools and paper☆146Updated 8 years ago
- Tools for timing attacks☆18Updated 8 years ago
- Recon materials☆28Updated 6 years ago
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆21Updated 8 years ago
- HILA5 KEM/DEM. Reference and Optimized Implementations + NIST PQC Submission Documents☆16Updated 6 years ago
- ☆11Updated 3 years ago
- Sample application to let OpenSSL talk to itself (for fuzzing)☆33Updated 8 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆65Updated 3 months ago
- estimate peak virtual memory use☆19Updated 7 months ago
- Slides and very basic examples☆111Updated 7 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆115Updated 7 years ago
- A repository of tools for verifying constant-timeness☆12Updated this week